@@ -31,7 +31,7 @@ services:
31
31
# worker service
32
32
# The Celery worker for processing the queue.
33
33
worker :
34
- image : langgenius/dify-api:1.8.0
34
+ image : langgenius/dify-api:1.8.1
35
35
restart : always
36
36
environment :
37
37
# Use the shared environment variables.
@@ -58,7 +58,7 @@ services:
58
58
# worker_beat service
59
59
# Celery beat for scheduling periodic tasks.
60
60
worker_beat :
61
- image : langgenius/dify-api:1.8.0
61
+ image : langgenius/dify-api:1.8.1
62
62
restart : always
63
63
environment :
64
64
# Use the shared environment variables.
@@ -76,7 +76,7 @@ services:
76
76
77
77
# Frontend web application.
78
78
web :
79
- image : langgenius/dify-web:1.8.0
79
+ image : langgenius/dify-web:1.8.1
80
80
restart : always
81
81
environment :
82
82
CONSOLE_API_URL : ${CONSOLE_API_URL:-}
@@ -118,7 +118,17 @@ services:
118
118
volumes :
119
119
- ./volumes/db/data:/var/lib/postgresql/data
120
120
healthcheck :
121
- test : [ 'CMD', 'pg_isready', '-h', 'db', '-U', '${PGUSER:-postgres}', '-d', '${POSTGRES_DB:-dify}' ]
121
+ test :
122
+ [
123
+ " CMD" ,
124
+ " pg_isready" ,
125
+ " -h" ,
126
+ " db" ,
127
+ " -U" ,
128
+ " ${PGUSER:-postgres}" ,
129
+ " -d" ,
130
+ " ${POSTGRES_DB:-dify}" ,
131
+ ]
122
132
interval : 1s
123
133
timeout : 3s
124
134
retries : 60
@@ -135,7 +145,11 @@ services:
135
145
# Set the redis password when startup redis server.
136
146
command : redis-server --requirepass ${REDIS_PASSWORD:-difyai123456}
137
147
healthcheck :
138
- test : [ 'CMD-SHELL', 'redis-cli -a ${REDIS_PASSWORD:-difyai123456} ping | grep -q PONG' ]
148
+ test :
149
+ [
150
+ " CMD-SHELL" ,
151
+ " redis-cli -a ${REDIS_PASSWORD:-difyai123456} ping | grep -q PONG" ,
152
+ ]
139
153
140
154
# The DifySandbox
141
155
sandbox :
@@ -157,7 +171,7 @@ services:
157
171
- ./volumes/sandbox/dependencies:/dependencies
158
172
- ./volumes/sandbox/conf:/conf
159
173
healthcheck :
160
- test : [ ' CMD', ' curl', '-f', ' http://localhost:8194/health' ]
174
+ test : [" CMD", " curl", "-f", " http://localhost:8194/health" ]
161
175
networks :
162
176
- ssrf_proxy_network
163
177
@@ -231,7 +245,12 @@ services:
231
245
volumes :
232
246
- ./ssrf_proxy/squid.conf.template:/etc/squid/squid.conf.template
233
247
- ./ssrf_proxy/docker-entrypoint.sh:/docker-entrypoint-mount.sh
234
- entrypoint : [ 'sh', '-c', "cp /docker-entrypoint-mount.sh /docker-entrypoint.sh && sed -i 's/\r$$//' /docker-entrypoint.sh && chmod +x /docker-entrypoint.sh && /docker-entrypoint.sh" ]
248
+ entrypoint :
249
+ [
250
+ " sh" ,
251
+ " -c" ,
252
+ " cp /docker-entrypoint-mount.sh /docker-entrypoint.sh && sed -i 's/\r $$//' /docker-entrypoint.sh && chmod +x /docker-entrypoint.sh && /docker-entrypoint.sh" ,
253
+ ]
235
254
environment :
236
255
# pls clearly modify the squid env vars to fit your network environment.
237
256
HTTP_PORT : ${SSRF_HTTP_PORT:-3128}
@@ -260,8 +279,8 @@ services:
260
279
- CERTBOT_EMAIL=${CERTBOT_EMAIL}
261
280
- CERTBOT_DOMAIN=${CERTBOT_DOMAIN}
262
281
- CERTBOT_OPTIONS=${CERTBOT_OPTIONS:-}
263
- entrypoint : [ ' /docker-entrypoint.sh' ]
264
- command : [ ' tail', '-f', ' /dev/null' ]
282
+ entrypoint : [" /docker-entrypoint.sh" ]
283
+ command : [" tail", "-f", " /dev/null" ]
265
284
266
285
# The nginx reverse proxy.
267
286
# used for reverse proxying the API service and Web service.
@@ -278,7 +297,12 @@ services:
278
297
- ./volumes/certbot/conf/live:/etc/letsencrypt/live # cert dir (with certbot container)
279
298
- ./volumes/certbot/conf:/etc/letsencrypt
280
299
- ./volumes/certbot/www:/var/www/html
281
- entrypoint : [ 'sh', '-c', "cp /docker-entrypoint-mount.sh /docker-entrypoint.sh && sed -i 's/\r$$//' /docker-entrypoint.sh && chmod +x /docker-entrypoint.sh && /docker-entrypoint.sh" ]
300
+ entrypoint :
301
+ [
302
+ " sh" ,
303
+ " -c" ,
304
+ " cp /docker-entrypoint-mount.sh /docker-entrypoint.sh && sed -i 's/\r $$//' /docker-entrypoint.sh && chmod +x /docker-entrypoint.sh && /docker-entrypoint.sh" ,
305
+ ]
282
306
environment :
283
307
NGINX_SERVER_NAME : ${NGINX_SERVER_NAME:-_}
284
308
NGINX_HTTPS_ENABLED : ${NGINX_HTTPS_ENABLED:-false}
@@ -300,14 +324,14 @@ services:
300
324
- api
301
325
- web
302
326
ports :
303
- - ' ${EXPOSE_NGINX_PORT:-80}:${NGINX_PORT:-80}'
304
- - ' ${EXPOSE_NGINX_SSL_PORT:-443}:${NGINX_SSL_PORT:-443}'
327
+ - " ${EXPOSE_NGINX_PORT:-80}:${NGINX_PORT:-80}"
328
+ - " ${EXPOSE_NGINX_SSL_PORT:-443}:${NGINX_SSL_PORT:-443}"
305
329
306
330
# The Weaviate vector store.
307
331
weaviate :
308
332
image : semitechnologies/weaviate:1.19.0
309
333
profiles :
310
- - ' '
334
+ - " "
311
335
- weaviate
312
336
restart : always
313
337
volumes :
@@ -360,13 +384,17 @@ services:
360
384
working_dir : /opt/couchbase
361
385
stdin_open : true
362
386
tty : true
363
- entrypoint : [ "" ]
387
+ entrypoint : ["" ]
364
388
command : sh -c "/opt/couchbase/init/init-cbserver.sh"
365
389
volumes :
366
390
- ./volumes/couchbase/data:/opt/couchbase/var/lib/couchbase/data
367
391
healthcheck :
368
392
# ensure bucket was created before proceeding
369
- test : [ "CMD-SHELL", "curl -s -f -u Administrator:password http://localhost:8091/pools/default/buckets | grep -q '\\[{' || exit 1" ]
393
+ test :
394
+ [
395
+ " CMD-SHELL" ,
396
+ " curl -s -f -u Administrator:password http://localhost:8091/pools/default/buckets | grep -q '\\ [{' || exit 1" ,
397
+ ]
370
398
interval : 10s
371
399
retries : 10
372
400
start_period : 30s
@@ -392,9 +420,9 @@ services:
392
420
volumes :
393
421
- ./volumes/pgvector/data:/var/lib/postgresql/data
394
422
- ./pgvector/docker-entrypoint.sh:/docker-entrypoint.sh
395
- entrypoint : [ ' /docker-entrypoint.sh' ]
423
+ entrypoint : [" /docker-entrypoint.sh" ]
396
424
healthcheck :
397
- test : [ ' CMD', ' pg_isready' ]
425
+ test : [" CMD", " pg_isready" ]
398
426
interval : 1s
399
427
timeout : 3s
400
428
retries : 30
@@ -411,14 +439,14 @@ services:
411
439
- VB_USERNAME=dify
412
440
- VB_PASSWORD=Difyai123456
413
441
ports :
414
- - ' 5434:5432'
442
+ - " 5434:5432"
415
443
volumes :
416
444
- ./vastbase/lic:/home/vastbase/vastbase/lic
417
445
- ./vastbase/data:/home/vastbase/data
418
446
- ./vastbase/backup:/home/vastbase/backup
419
447
- ./vastbase/backup_log:/home/vastbase/backup_log
420
448
healthcheck :
421
- test : [ ' CMD', ' pg_isready' ]
449
+ test : [" CMD", " pg_isready" ]
422
450
interval : 1s
423
451
timeout : 3s
424
452
retries : 30
@@ -440,7 +468,7 @@ services:
440
468
volumes :
441
469
- ./volumes/pgvecto_rs/data:/var/lib/postgresql/data
442
470
healthcheck :
443
- test : [ ' CMD', ' pg_isready' ]
471
+ test : [" CMD", " pg_isready" ]
444
472
interval : 1s
445
473
timeout : 3s
446
474
retries : 30
@@ -479,7 +507,11 @@ services:
479
507
ports :
480
508
- " ${OCEANBASE_VECTOR_PORT:-2881}:2881"
481
509
healthcheck :
482
- test : [ 'CMD-SHELL', 'obclient -h127.0.0.1 -P2881 -uroot@test -p$${OB_TENANT_PASSWORD} -e "SELECT 1;"' ]
510
+ test :
511
+ [
512
+ " CMD-SHELL" ,
513
+ ' obclient -h127.0.0.1 -P2881 -uroot@test -p$${OB_TENANT_PASSWORD} -e "SELECT 1;"' ,
514
+ ]
483
515
interval : 10s
484
516
retries : 30
485
517
start_period : 30s
@@ -515,7 +547,7 @@ services:
515
547
- ./volumes/milvus/etcd:/etcd
516
548
command : etcd -advertise-client-urls=http://127.0.0.1:2379 -listen-client-urls http://0.0.0.0:2379 --data-dir /etcd
517
549
healthcheck :
518
- test : [ ' CMD', ' etcdctl', ' endpoint', ' health' ]
550
+ test : [" CMD", " etcdctl", " endpoint", " health" ]
519
551
interval : 30s
520
552
timeout : 20s
521
553
retries : 3
@@ -534,7 +566,7 @@ services:
534
566
- ./volumes/milvus/minio:/minio_data
535
567
command : minio server /minio_data --console-address ":9001"
536
568
healthcheck :
537
- test : [ ' CMD', ' curl', '-f', ' http://localhost:9000/minio/health/live' ]
569
+ test : [" CMD", " curl", "-f", " http://localhost:9000/minio/health/live" ]
538
570
interval : 30s
539
571
timeout : 20s
540
572
retries : 3
@@ -546,15 +578,15 @@ services:
546
578
image : milvusdb/milvus:v2.5.15
547
579
profiles :
548
580
- milvus
549
- command : [ ' milvus', ' run', ' standalone' ]
581
+ command : [" milvus", " run", " standalone" ]
550
582
environment :
551
583
ETCD_ENDPOINTS : ${ETCD_ENDPOINTS:-etcd:2379}
552
584
MINIO_ADDRESS : ${MINIO_ADDRESS:-minio:9000}
553
585
common.security.authorizationEnabled : ${MILVUS_AUTHORIZATION_ENABLED:-true}
554
586
volumes :
555
587
- ./volumes/milvus/milvus:/var/lib/milvus
556
588
healthcheck :
557
- test : [ ' CMD', ' curl', '-f', ' http://localhost:9091/healthz' ]
589
+ test : [" CMD", " curl", "-f", " http://localhost:9091/healthz" ]
558
590
interval : 30s
559
591
start_period : 90s
560
592
timeout : 20s
@@ -620,7 +652,7 @@ services:
620
652
volumes :
621
653
- ./volumes/opengauss/data:/var/lib/opengauss/data
622
654
healthcheck :
623
- test : [ "CMD-SHELL", "netstat -lntp | grep tcp6 > /dev/null 2>&1" ]
655
+ test : ["CMD-SHELL", "netstat -lntp | grep tcp6 > /dev/null 2>&1"]
624
656
interval : 10s
625
657
timeout : 10s
626
658
retries : 10
@@ -673,18 +705,19 @@ services:
673
705
node.name : dify-es0
674
706
discovery.type : single-node
675
707
xpack.license.self_generated.type : basic
676
- xpack.security.enabled : ' true'
677
- xpack.security.enrollment.enabled : ' false'
678
- xpack.security.http.ssl.enabled : ' false'
708
+ xpack.security.enabled : " true"
709
+ xpack.security.enrollment.enabled : " false"
710
+ xpack.security.http.ssl.enabled : " false"
679
711
ports :
680
712
- ${ELASTICSEARCH_PORT:-9200}:9200
681
713
deploy :
682
714
resources :
683
715
limits :
684
716
memory : 2g
685
- entrypoint : [ 'sh', '-c' , "sh /docker-entrypoint-mount.sh" ]
717
+ entrypoint : ["sh", "-c" , "sh /docker-entrypoint-mount.sh"]
686
718
healthcheck :
687
- test : [ 'CMD', 'curl', '-s', 'http://localhost:9200/_cluster/health?pretty' ]
719
+ test :
720
+ ["CMD", "curl", "-s", "http://localhost:9200/_cluster/health?pretty"]
688
721
interval : 30s
689
722
timeout : 10s
690
723
retries : 50
@@ -702,17 +735,17 @@ services:
702
735
environment :
703
736
XPACK_ENCRYPTEDSAVEDOBJECTS_ENCRYPTIONKEY : d1a66dfd-c4d3-4a0a-8290-2abcb83ab3aa
704
737
NO_PROXY : localhost,127.0.0.1,elasticsearch,kibana
705
- XPACK_SECURITY_ENABLED : ' true'
706
- XPACK_SECURITY_ENROLLMENT_ENABLED : ' false'
707
- XPACK_SECURITY_HTTP_SSL_ENABLED : ' false'
708
- XPACK_FLEET_ISAIRGAPPED : ' true'
738
+ XPACK_SECURITY_ENABLED : " true"
739
+ XPACK_SECURITY_ENROLLMENT_ENABLED : " false"
740
+ XPACK_SECURITY_HTTP_SSL_ENABLED : " false"
741
+ XPACK_FLEET_ISAIRGAPPED : " true"
709
742
I18N_LOCALE : zh-CN
710
- SERVER_PORT : ' 5601'
743
+ SERVER_PORT : " 5601"
711
744
ELASTICSEARCH_HOSTS : http://elasticsearch:9200
712
745
ports :
713
746
- ${KIBANA_PORT:-5601}:5601
714
747
healthcheck :
715
- test : [ ' CMD-SHELL', ' curl -s http://localhost:5601 >/dev/null || exit 1' ]
748
+ test : [" CMD-SHELL", " curl -s http://localhost:5601 >/dev/null || exit 1" ]
716
749
interval : 30s
717
750
timeout : 10s
718
751
retries : 3
0 commit comments